answersLogoWhite

0


Best Answer

SNMP

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What protocol is most susceptible to a packet sniffer?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What does protocol binding order refer to?

Protocol binding order refers to the order in which a protocol will be matched to a data packet. If, for example, you have a network connection which is running several different protocols it is important to tell the system which protocol to try first. If you are using Netware, TCP/IP, and any other protocols on the same network, if 70% of your network traffic (as an example) is TCP/IP, then you want the network operating system software to check if a packet is a TCP/IP packet first, and if not, try the other networking protocols. With the binding order, you tell the adaptor the order of checking for the correct network protocol, starting with the one with the most traffic, and going down from there.


Who wrote the program that started the web?

DARPA (Defense Advanced Research Projects Agency) were the first to build a packet switching network in 1968. Later, more protocols (computer-to-computer languages) were written -- and by May, 1974, IEEE members Vint Cerf and Bob Kahn had published a paper which described an internetworking protocol for sharing resources using packet-switching among the nodes. This protocol came to be known as Transmission Control Protocol and grew later into the layered protocol: TCP/IP. This protocol is the most popular protocol in use today, and is the foundation of communications over the web.


Who was the plagues most notable victim?

butt sniffer


Which are the two protocols associated with layer 4 of the OSI model?

There are actually more than two protocols associated with Layer 4. According to Wikipedia, there are Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Stream Control Transport Protocol (SCTP), Datagram Congestion Control Protocol (DCCP), and Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX).


What do the letters tcpip stand for?

TCP/IP is a very common type of network protocol.TCP stands for Transmission Control Protocol and is used to create data connections between computers. Primarily, it is a "connection oriented protocol" in a sense that every connection goes through a three-way-handshake (SYN, ACK/SYN, ACK) to establish a connection before data is transmitted. Once the connection is established, each data packet that is received by the destination computer triggers an ACK packet (short for Acknowledge) to say that the data was received without error. That ACK packet will not be sent if the data packet is not received or if the data packet does not match the CRC (Cycle Redundancy Check). If the computer that sent the data packet does not hear that ACK packet, it sends the data packet again. The majority of traffic on the internet is TCP.TCP can be easily compared to UDP (User Datagram Protocol) which does not create a "connection" or ask for a acknowledgment packet and therefor typically has less overhead and latency. With UDP, data is sent to an address without worry for whether or not it reached its destination successfully. It is often used for streams such as internet radio/audio or video.IP stands for Internet Protocol. IP is the framework that lets computers address and communicate with each other. Most commonly known is an IP Address. An IP Address is a set of numbers given to a computer so that it may communicate with other computers with IP addresses. A common analogy is the phone system. To talk to someone, you simply dial their number.For example, to submit this answer, my computer made a TCP connection to wiki.answers.com's IP address and sent a data stream containing my writings. After each packet my computer sent, wiki.answers.com sent an acknowledge packet back.


What liquids are most susceptible to bacterial growth?

There are quite a few liquids that are susceptible to bacterial growth. Water and sugary warm liquids are the most susceptible.


What patient population is most susceptible to ssss?

Patients with compromised immune systems, such as those with HIV/AIDS, cancer, or undergoing chemotherapy, are most susceptible to Staphylococcal Scalded Skin Syndrome (SSSS) due to their weakened ability to fight off infections. Additionally, newborns and young children are also at higher risk of developing SSSS.


What of the three analog-to-analog conversion techniques AM FM or PM is the most susceptible to noise?

AM is most susceptible to noise.


What part of Australia Oceania is most susceptible to tsunami hazards?

Papua, New Guinea is most susceptible to tsunami hazards.


What is the most implemented routing protocol in the world?

IP (Internet Protocol)


What is the most common protocol for computer networking?

ip - internet protocol. The Internet uses many layered protocols. The two protocols used the most are tcp/ip (tcp protocol on top of ip) and udp/ip (udp protocol on top of ip). Web browsers use tcp/ip. Email uses tcp/ip. Many web applications and games use udp/ip for broadcasting video, audio, and for multiplayer games. ip runs within/on yet many other base protocols. The most common protocol inside homes and business is ethernet. tcp/ip can run on ethernet and many other base protocols. Analogy: Think of shipping and boxes as protocols and packets. You might ship something in a box to another country. The address system on the box could be part of the ip protocol. Your box goes in a UPS truck (a bigger box - think ethernet packet holding your ip packet) with other boxes then goes to a distribution center (a router), then maybe into a container and on a ship (a different box - say FIOS fiber protocols). So tcp within ip within ethernet is like ups package within container on a container ship. In networks the containers can but don't always get bigger as you get onto the backbone - they tend instead to get faster. An ethernet packet might contain 2 different ip packets each which might have 2 tcp packets. More often it is a 1 to 1 relationship.


What two areas found in the rib cage and sternum are most susceptible to injury?

The floating ribs and the false ribs are the most susceptible to injury.